THREAT DETECTION.

Monitor the internet for any signs of
data leakage from your company.

 

Overview

The risk of targeted attacks and industrial espionage has become a growing threat. Furthermore, malware is becoming even more sophisticated. Secrets are sold to the highest bidder on the black market by the minute

Proactive defence
We scour the web and alert you when we find suspicious or damaging activity, such as copycat sites, scam mails and dropzone information pools. We can then take the malicious sites down.

Switch to a proactive defence posture and reduce the risk of having to deal with cruel front page news.

Key features

  • Works when all other security measures fail.
  • Managed by specialists.
  • Managed Cloud service.
  • Real-time alert services.
  • Platform independent.
  • No installation needed.

Summarised benefits

  • Add a security layer outside of your network.
  • Be more prepared.
  • Keep tabs on on criminal environments.
  • SaaS: No hardware or software costs

Monitors available


Honey Net Monitor

We monitor a vast amount of malicious servers and domains all over the world, and analyse sinkholes for any communication from your public IP ranges. The monitor is configured to instantly warn you about malicious traffic originating from your network. Warnings contain positive evidence of infections or data leakage and contain relevant metadata available through a secure web interface.

Benefits
You will immediately be notified of infections in the network, with information about malware type and what type of information has been targeted. That will allow you rapidly clean infections, change passwords for infected users, and limit the abuse of potential stolen data.


Website Scanner

We continuously scan your company's website for injections, referrals to malicious URLs, or other compromises of your web pages. Our database contains millions of URLs used for criminal activity, and can therefore quickly determine potential threats. If malicious URLs are detected, we immediately analyse them and notify you.

Benefit
Users on your site will not be infected or deceived by information injected by malicious actors onto your website.

 

Blacklisting Monitor

We monitor an extensive list of email blacklisting services, and alert you if your mail domain appears in any of these global blacklists. We can also help remove you from the blacklists.

Benefit
Minimise disruption after being placed on a blacklist, ensuring regular mail flow without interruptions.

 

Drop Data Monitor

We continuously apply malicious drop server takedowns, often in cooperation with regional or global law enforcement agencies (eg Europol, FBI, etc.). After a successful takedown, we frequently access leaked data from the servers, which may be used in a targeted attack (eg login credentials, documents, source code, product information, data related to customers, etc.).

Benefits
Being aware of leakage information allows you to take immediate action in preventing misuse of leaked user information, and to implement safeguards preventing future leaks.


Underground Monitor

Through a network of aliases and virtual identities, we monitor (both manually and automatically) hidden and closed forums for anything that might be compromising for you organisation. The search is based on keywords that can be defined by you.

Benefit
If stolen information or intelligence related to your organisation is shared or traded online, you become the first to know. Remedial action can be taken immediately to avoid expensive incidents.


Trojan Monitor

Trojan malware often uses target lists for stealing user credentials or manipulating targeted websites. We monitor Trojan target lists and config files for your URLs and brands, and if you are targeted (or if a specific Trojan threat arises in your region) you will be the first to know.

Benefit
We provide you with the detailed information needed to take immediate measures in ensuring continuity and protection of your customers and your brand.

 

Rogue App Monitor

We monitor official IOS and Android app stores for both legitimate and malicious apps related to your brands. When we detect suspicious new apps (or when existing suspicious apps are updated), we alert you immediately and provide an assessment of maliciousness.

Benefit
Protect your organisation and your customers from interacting with malicious apps.


Typo Squatting/Brand abuse

We track domains designed by criminals to resemble your own brand for use in phishing campaigns, CEO fraud and the like. We alert you immediately if a typo squatting domain has been registered or altered in any way. Priority takedown requests may be initiated using our extensive network and our close relationship with law enforcement agencies.

Benefits
Protect your brand and significantly minimise instances of deception or compromise among your customers.

 

 

Access to the CSIS Threat Intelligence Portal

 

 

Save

Threat detection customers get access to the CSIS Threat Intelligence Portal, a secure, web-based communication platform.

The portal includes a ticketing system, crimeware and malware databases, insight articles, statistics, and much more.

 

 

Save

Stop attacks before they disrupt

REST ASSURED.

Stop attacks before they disrupt your mission critical systems.

 

Takedowns

As well as monitoring sites that are misusing your brand to lure information from users, we also initiate takedowns of such sites.

Our experience and close relationships with a long list of hosting providers ensures that we can react rapidly, no matter where the site is hosted.

 

Get Threat Detection for your organisation

Choose between:


Thank you for your interest in CSIS

We will get back to you as soon as possible.